1. [1] Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., Kallitsis, M., et al. Understanding the Mirai botnet. In 26th USENIX Security Symposium (USENIX Security 17) (2017), pp. 1092–1110.
2. [2] Apthorpe, N., Reisman, D., and Feamster, N. Closing the blinds: Four strategies for protecting smart home privacy from network observers. Workshop on Technology and Consumer Protection (ConPro) (2017).
3. [3] Apthorpe, N., Reisman, D., and Feamster, N. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. Data and Algorithmic Transparency Workshop (DAT) (2017).
4. [4] Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., and Feamster, N. Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. arXiv preprint arXiv:1708.05044 (2017).
5. [5] Back, A., Möller, U., and Stiglic, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In International Workshop on Information Hiding (2001), Springer, pp. 245–257.